Wireless Security: Top Priority for 2005
      
    
   
  London, UK - 27 January 2005, 16:30 GMT - Millions of businesses and 
    computer users are at risk from hackers and malware writers targeting wireless 
    internet systems and mobile telephone devices in 2005 according to the latest 
    data for live digital attacks collected by the mi2g Intelligence Unit 
    in Q4 2004. This trend is likely to be confirmed by government sponsored studies 
    currently underway in the US, UK, Japan and Germany amongst other OECD member 
    countries. The threat is exacerbated by the increased migration of corporations 
    and government departments towards IP (internet protocol) based voice telephony 
    and video communications along with Bluetooth enabled mobile telephone access 
    of fixed lines. As a result, when systems fail or get corrupted, voice, video 
    and data communications may go down together. 
    
    Nearly one out of every two recorded digital attacks is now taking place via 
    the wireless route as opposed to one out every ten, at the start of 2004. 
    The quarter by quarter rise of wireless digital attacks is unprecedented as 
    the number of adaptors of wireless internet connectivity grows exponentially 
    in the consumer, corporate and government sectors. The illegal use of other 
    organisation's wireless internet facilities is also rising as many individuals 
    simply utilise 'free' internet access through roaming and adopt a carefree 
    attitude when questioned on the ethics of "piggy-backing" on somebody 
    else's W-LAN (Wireless Local Area Network) without their knowledge or permission.
    
    Mobile phone devices are susceptible to malware because they use operating 
    systems that have turned them into mini-computers. Virus and worm attacks 
    are increasingly infecting mobile phones and this is just the beginning. In 
    the last few days new Trojan horse programs - believed to have originated 
    in Russia - have appeared which render Symbian-based mobile phones useless 
    in terms of being able to make calls. Gavno variants masquerade as 
    patch files and other camouflaged files designed to trick users into downloading 
    them. The variants can infect popular phones such as Nokia's 6600 and 7610 
    models using Symbian's OS version 7. The modus operandi for repair is a global 
    reset which then deletes all personal data like the address book and calendar. 
    
    
    The mi2g Intelligence Unit would caution that the age of mass mobile 
    phone malware in the highly damaging category of MyDoom or MSBlast has still 
    not arrived and may depend on other enabling technologies before such an event 
    could be realistically precipitated. In 2005, as network operators finally 
    begin to offer different classes of voice services, including priority communications 
    and one-to-many or many-to-many services, such as network-based cellular conferencing, 
    mobile phone viruses will be able to spread more swiftly. Japanese phone company 
    NTT DoCoMo already sells phones with built-in antivirus software and similar 
    phones are going to be available in the US, UK and mainland Europe later this 
    year.
    
    Another increasingly common practice is Bluejacking. People are using Bluetooth 
    to send messages to unsuspecting people within earshot or with good line of 
    sight and proximity, a practice commonly known as bluejacking. Unexpected 
    messages on a mobile telephone may lead a user to believe that they are a 
    victim of a new mobile phone virus or receiving cell phone spam.
    
    "The consequences of mobile phone malware proliferation and wireless 
    network hacking include data and identity theft, generation of expensive phone 
    calls and on demand services' bills, as well as crippled handsets and disconnected 
    computers," said DK 
    Matai, Executive Chairman, mi2g. "The 
    two dimensional world of network computer security was turned three dimensional 
    by the arrival of internet connectivity and it has now been rendered four 
    dimensional with wireless connectivity and mobile telephony's convergence 
    on top of the existing computing infrastructure. The possibilities for security 
    breach and damage are multiplying by orders of magnitude not seen before and 
    user awareness is very poor. In our experience, most domestic and many corporate 
    W-LANs in London, New York and Tokyo are running without any basic level of 
    security settings switched on. Entering these wireless networks is effortless 
    because it requires no password at all."
    
    For corporations and government bodies, the short term solution lies in commissioning 
    independent audits which include full fledged penetration testing focussed 
    on wireless connectivity. Within the domestic environment the vendors of wireless 
    devices and internet services must be obliged to write warnings on the wireless 
    devices they offer to forewarn customers of the liability and potential for 
    online theft that exists if no security settings are invoked. Default settings 
    should include basic security and must prompt for password entry. In the long 
    term, there is a need for 24/7 risk visualisation at the large organisation 
    level and 'neighbourhood watch' schemes at the small to medium size enterprise 
    and domestic level, because the complexity of maintaining computer and mobile 
    telephone security is far greater in the wireless connectivity era. 
    
    [ENDS]
    
    
    mi2g is at the leading edge of building secure on-line banking, broking 
    and trading architectures. The principal applications of our technology are:
    
    1. D2-Banking; 
    2. Digital Risk Management; and 
    3. Bespoke Security Architecture.
    
    mi2g pioneers enterprise-wide security practices and technology to 
    save time and cut cost. We enhance comparative advantage within financial 
    services and government agencies. Our real time intelligence is deployed worldwide 
    for contingency capability, executive decision making and strategic threat 
    assessment.
    
    mi2g Research Methodology: The Frequently Asked Questions (FAQ) List 
    is available from here in pdf. Please 
    note terms and conditions of use listed on 
    www.mi2g.net
  
  Full details of the December 2004 report are available as of 1st January 
    2005 and can be ordered from here. 
    (To view contents sample please click here).